Edimax acknowledges exploited vulnerability in IC-7100 cameras, no patch

Edimax acknowledges exploited vulnerability in IC-7100 cameras, no patch

Taiwan-based networking solutions provider Edimax has issued a security advisory acknowledging a vulnerability in one of its legacy camera models, the Edimax IC-7100.

However, the company said that no security patches or firmware updates will be released because the said model was discontinued more than ten years ago, and is no longer supported with technical assistance or firmware updates.

“The Edimax IC-7100 is a legacy product that was discontinued over 10 years ago, and its technical support and firmware maintenance were officially terminated,” the company said. “Due to the unavailability of the development environment and source code, we regret to inform that no security patch or firmware update can be provided for this product.”

The vulnerability, tracked as CVE-2025-1316, was discovered by researchers at Akamai, who said that the flaw as being actively exploited by several Mirai-based botnets.

According to Akamai, the Mirai botnet exploits CVE-2025-1316 by running a shell script that downloads a Mirai payload after compromising a device. Despite requiring authentication, threat actors have been able to leverage the fact that many devices still rely on default credentials, making them easy targets for exploitation.

In a security advisory released last week, CISA provided details on CVE-2025-1316, though the agency did not confirm active exploitation at that time.

This week, CISA updated its Known Exploited Vulnerabilities (KEV) catalog with a slew of vulnerabilities impacting Advantive VeraCore and Ivanti Endpoint Manager (EPM).

These included:

  • CVE-2024-57968: An unrestricted file upload vulnerability in Advantive VeraCore that could allow remote, unauthenticated attackers to upload files to unintended directories.

  • CVE-2025-25181: An SQL injection vulnerability in Advantive VeraCore, which allows attackers to execute arbitrary SQL commands.

  • CVE-2024-13159, CVE-2024-13160, CVE-2024-13161: Multiple absolute path traversal vulnerabilities in Ivanti Endpoint Manager (EPM), which allow attackers to leak sensitive information remotely without authentication.

Also, Taiwanese company Moxa specializing in industrial networking solutions, has released a patch addressing CVE-2024-12297, a flaw in its PT switches that could allow attackers to bypass authentication protections.

 

Back to the list

Latest Posts

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

UAT-5918 info-stealing campaign targets critical infrastructure entities in Taiwan

The tactics and tools employed by UAT-5918 overlap with other state-sponsored threat groups, such as Volt Typhoon, Flex Typhoon, and Earth Estries.
20 March 2025
New supply chain attack allows to inject malicious code via AI code editors

New supply chain attack allows to inject malicious code via AI code editors

By exploiting hidden unicode characters and employing advanced evasion techniques, attackers can subtly alter the behavior of AI models.
19 March 2025
Russian disinformation actors employ new tactics to maintain influence

Russian disinformation actors employ new tactics to maintain influence

Rather than immediately deploying newly registered domains, many threat actors now secure domain names months in advance.
19 March 2025